You are not logged in.

#1 2023-07-28 10:57:14

TinkerToadie
Member
Registered: 2023-03-17
Posts: 5

Can't ping IPv6 address [IPv6 module not loaded? Routing table issue?]

Dear Arch community,

although I know that -- according to the Wiki -- IPv6 should be set up by default on Arch I am struggling with getting IPv6 connections on my install with kernel

uname -r
6.4.6-hardened1-1-hardened

Whenever I ping an IPv6 address, e.g. an openNIC-DNS server, via both my ethernet and wifi interface I get the error

ping -6 2a03:4000:28:365::1
ping: connect: Network is unreachable

but the interface has got a (local?) IPv6 address assigned (wifi connection established):

ip -6 a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 state UNKNOWN qlen 1000
    inet6 ::1/128 scope host noprefixroute 
       valid_lft forever preferred_lft forever
3: wlp61s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fd00::c314:XXXX:XXXX:XXXX/64 scope global dynamic mngtmpaddr noprefixroute 
       valid_lft 6647sec preferred_lft 3047sec
    inet6 fe80::60e2:XXX:XXX:XXXX/64 scope link 
       valid_lft forever preferred_lft forever

Everything works fine for another hardened-kernel Arch and two further Debian-based systems in the same network so it should not be a router or ISP related issue but with the system under consideration the IPv6 connection fails in every network which I tested it in.

I've run through the procedure *here* to test if the IPv6 module is disabled which seems not to be the case:

cat /proc/net/if_inet6
fe8000000000000060e20e6ae8ab75c6 03 40 20 80  wlp61s0
00000000000000000000000000000001 01 80 10 80       lo
fd00000000000000c3147f7afac159ee 03 40 00 00  wlp61s0
cat /sys/module/ipv6/parameters/disable
0
sudo sysctl -a | grep disable_ipv6
net.ipv6.conf.all.disable_ipv6 = 0
net.ipv6.conf.default.disable_ipv6 = 0
net.ipv6.conf.enp0s31f6.disable_ipv6 = 0
net.ipv6.conf.lo.disable_ipv6 = 0
net.ipv6.conf.wlp61s0.disable_ipv6 = 0

After loading the module, however, modinfo shows information but lsmod does not seem to find the IPv6 module loaded:

sudo modprobe ipv6
modinfo ipv6
name:           ipv6
filename:       (builtin)
alias:          net-pf-10
license:        GPL
file:           net/ipv6/ipv6
description:    IPv6 protocol stack for Linux
author:         Cast of dozens
parm:           disable:Disable IPv6 module such that it is non-functional (int)
parm:           disable_ipv6:Disable IPv6 on all interfaces (int)
parm:           autoconf:Enable IPv6 address autoconfiguration on all interfaces (int)
lsmod | grep ipv6
[empty outout]

The module appears to be installed though:

ls /lib/modules/6.4.6-hardened1-1-hardened/kernel/net/ipv6
ah6.ko.zst           ila                    ip6_vti.ko.zst  sit.ko.zst
esp6.ko.zst          ip6_gre.ko.zst         ipcomp6.ko.zst  tunnel6.ko.zst
esp6_offload.ko.zst  ip6_tunnel.ko.zst      mip6.ko.zst     xfrm6_tunnel.ko.zst
fou6.ko.zst          ip6_udp_tunnel.ko.zst  netfilter

Just now after gathering all this information I found an odd situation in my routing table:

route -6
Kernel IPv6 routing table
Destination                    Next Hop                   Flag Met Ref  Use If
fd00::/64                      [::]                       U    3003 1      0 wlp61s0
fe80::/64                      [::]                       U    256 2      0 wlp61s0
[::]/0                            [::]                       !n   -1  1      0 lo
localhost/128                  [::]                       Un   0   3      0 lo
mydevice/128                 [::]                       Un   0   2      0 wlp61s0
mydevice/128                 [::]                       Un   0   3      0 wlp61s0
ff00::/8                       [::]                       U    256 9      0 wlp61s0
[::]/0                         [::]                       !n   -1  1      0 lo

Doesn't that mean that all general traffic ([::]/0) is going back through the loopback interface (lo) ?? What does the "!n" flag mean? Why are there two "mydevice/128" entries? Unfortunately I don't know enough about routing to fully understand this output... If someone knows about good literature (online or offline) I'd be glad for every hint!

Thank you in advance and all the best,
tinkertoadie

Offline

#2 2023-07-28 11:12:40

-thc
Member
Registered: 2017-03-15
Posts: 516

Re: Can't ping IPv6 address [IPv6 module not loaded? Routing table issue?]

Because your network stack has/acquires an ULA address (fd00::/16) IPv6 is working.

Your problem is the connectivity beyond link-local and ULA addresses.
ULA addresses will not be used for access beyond your router.

How do you manage your network connections?

Offline

#3 2023-07-28 21:50:13

TinkerToadie
Member
Registered: 2023-03-17
Posts: 5

Re: Can't ping IPv6 address [IPv6 module not loaded? Routing table issue?]

Ok, that's good to know at least! I guess I need to read a bit about IPv6 in general.

All I do -- in case of wifi -- is setting up the interface, starting the dhcpc client and starting wpa_supplicant with the respective driver and config file containing the network's SSID/PSK which I include manually for every network:

ifconfig wlp32s0 up
dhcpcd 
wpa_supplicant -D wext -i wlp32s0 -c /etc/wpa_supplicant/wpa.conf

Wrote a small bash script for that, no further "managing" involved.

What about that routing table? I never saw that "!n" flag before and it's not even contained in the man file of route. But there it is stated that "!" means  "reject route"...

Last edited by TinkerToadie (2023-07-28 21:52:12)

Offline

#4 2023-07-29 06:28:58

seth
Member
Registered: 2012-09-03
Posts: 52,274

Re: Can't ping IPv6 address [IPv6 module not loaded? Routing table issue?]

Run wpa_supplicant first, add "-d" to the parameters and post the output you get.
Then, when it looks like you've a carrier, run "dhcpcd -dB" (it'll not fork), wait a minute (get a cup of coffee) and post the output of that as well.

Edit: sanity check
Please post the output of

find /etc/systemd -type l -exec test -f {} \; -print | awk -F'/' '{ printf ("%-40s | %s\n", $(NF-0), $(NF-1)) }' | sort -f

Last edited by seth (2023-07-29 06:29:19)

Offline

#5 2023-07-30 10:43:40

TinkerToadie
Member
Registered: 2023-03-17
Posts: 5

Re: Can't ping IPv6 address [IPv6 module not loaded? Routing table issue?]

Hey Seth, thanks for your help!

That's a damn lot of output although I shortened it a bit:

wpa_supplicant -D wext -i wlp61s0 -c /etc/wpa_supplicant/wpa_mobile.conf -d

wpa_supplicant v2.10
Successfully initialized wpa_supplicant
Initializing interface 'wlp61s0' conf '/etc/wpa_supplicant/wpa_mobile.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_mobile.conf' -> '/etc/wpa_supplicant/wpa_mobile.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_mobile.conf'
Priority group 2
   id=2 ssid='YYYY'
Priority group 1
   id=0 ssid='XXXX'
   id=1 ssid='XXXX'
   id=6 ssid='XXXX'
Priority group 0
   id=3 ssid='XXXX'
   id=4 ssid='XXXX'
   id=5 ssid='XXXX'
WEXT: cfg80211-based driver detected
wext: interface wlp61s0 phy: phy0
rfkill: initial event: idx=2 type=1 op=0 soft=0 hard=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0x1f flags 0x0
WEXT: Driver: iwlwifi
netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
Add interface wlp61s0 to a new radio phy0
wlp61s0: Own MAC address: 48:f1:7f:c9:ff:18
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_countermeasures
wlp61s0: RSN: flushing PMKID list in the driver
wlp61s0: Setting scan request: 0.100000 sec
TDLS: TDLS operation not supported by driver
TDLS: Driver uses internal link setup
TDLS: Driver does not support TDLS channel switching
wlp61s0: WPS: UUID based on MAC address: 5d1897a1-efd0-574e-8f22-5ad8499d6445
ENGINE: Loading builtin engines
ENGINE: Loading builtin engines
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
MBO: Update non-preferred channels, non_pref_chan=N/A
wlp61s0: Added interface wlp61s0
wlp61s0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
wlp61s0: State: DISCONNECTED -> SCANNING
wlp61s0: Starting AP scan for wildcard SSID
wlp61s0: Add radio work 'scan'@0xca3681f630
wlp61s0: First radio work item in the queue - schedule start immediately
wlp61s0: Starting radio work 'scan'@0xca3681f630 after 0.000031 second wait
Scan requested (ret=0) - scan timeout 10 seconds
EAPOL: disable timer tick
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=16
wlp61s0: Event SCAN_RESULTS (3) received
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Scan results did not fit - trying larger buffer (32768 bytes)
Received 19971 bytes of scan results (32 BSSes)
wlp61s0: BSS: Start scan result update 1
wlp61s0: BSS: Add new id 0 BSSID 04:a2:22:25:ae:bf SSID 'XXXX' freq 5560
[...]
wlp61s0: BSS: Add new id 31 BSSID aa:f5:dd:c1:3c:b9 SSID 'XXXX' freq 2462
BSS: last_scan_res_used=32/32
wlp61s0: New scan results available (own=0 ext=0)
WPS: AP 04:a2:22:25:ae:bf type 0 added
[...]
WPS: AP a8:f5:dd:c1:3c:b9 type 0 added
WPS: AP[0] 04:a2:22:25:ae:bf type=0 tries=0 last_attempt=-1 sec ago bssid_ignore=0
[...]
WPS: AP[20] a8:f5:dd:c1:3c:b9 type=0 tries=0 last_attempt=-1 sec ago bssid_ignore=0
wlp61s0: Radio work 'scan'@0xca3681f630 done in 3.078193 seconds
wlp61s0: radio_work_free('scan'@0xca3681f630): num_active_works --> 0
wlp61s0: Selecting BSS from priority group 2
wlp61s0: 0: 04:a2:22:25:ae:bf ssid='XXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-48 freq=5560  wps
wlp61s0:    skip - SSID mismatch
[...]
wlp61s0: 31: aa:f5:dd:c1:3c:b9 ssid='XXXX' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-83 freq=2462 
wlp61s0:    skip - SSID mismatch
wlp61s0: Selecting BSS from priority group 1
wlp61s0: 0: 04:a2:22:25:ae:bf ssid='XXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-48 freq=5560  wps
wlp61s0:    skip - SSID mismatch
wlp61s0:    skip - SSID mismatch
wlp61s0:    skip - SSID mismatch
wlp61s0: 1: 06:a2:22:25:ae:c2 ssid='XXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-48 freq=5560 
wlp61s0:    skip - SSID not known
wlp61s0: 2: 22:5b:ad:66:dc:f3 ssid='XXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-50 freq=5180  wps
wlp61s0:    skip - SSID mismatch
wlp61s0:    selected based on RSN IE
wlp61s0:    selected BSS 22:5b:ad:66:dc:f3 ssid='YYYY'
wlp61s0: Considering connect request: reassociate: 0  selected: 22:5b:ad:66:dc:f3  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xca367d75a0  current_ssid=(nil)
wlp61s0: Request association with 22:5b:ad:66:dc:f3
TDLS: TDLS is allowed in the target BSS
TDLS: TDLS channel switch allowed in the target BSS
wlp61s0: No ongoing scan/p2p-scan found to abort
wlp61s0: Add radio work 'connect'@0xca3682ccf0
wlp61s0: First radio work item in the queue - schedule start immediately
wlp61s0: Starting radio work 'connect'@0xca3682ccf0 after 0.000082 second wait
wlp61s0: WPA: clearing own WPA/RSN IE
wlp61s0: RSN: clearing own RSNXE
RSN: PMKSA cache search - network_ctx=0xca367d75a0 try_opportunistic=0 akmp=0x0
RSN: Search for BSSID 22:5b:ad:66:dc:f3
RSN: No PMKSA cache entry found
wlp61s0: RSN: using IEEE 802.11i/D9.0
wlp61s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
wlp61s0: WPA: Selected mgmt group cipher 32
wlp61s0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlp61s0: WPA: clearing AP RSNXE
wlp61s0: WPA: AP group 0x10 network profile group 0x18; available group 0x10
wlp61s0: WPA: using GTK CCMP
wlp61s0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available pairwise 0x10
wlp61s0: WPA: using PTK CCMP
wlp61s0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2
wlp61s0: WPA: using KEY_MGMT WPA-PSK
wlp61s0: WPA: AP mgmt_group_cipher 0x20 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
wlp61s0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RSN: Set own RSNXE default - hexdump(len=0):
WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
wlp61s0: Automatic auth_alg selection: 0x1
No supported operating classes IE to add
wlp61s0: Trying to associate with 22:5b:ad:66:dc:f3 (SSID='YYYY' freq=5180 MHz)
wlp61s0: Cancelling scan request
wlp61s0: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
Limit connection to BSSID 22:5b:ad:66:dc:f3 freq=5180 MHz based on scan results (bssid_set=0 wps=0)
wlp61s0: Determining shared radio frequencies (max len 1)
wlp61s0: Shared frequencies (len=0): completed iteration
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlp61s0: Setting authentication timeout: 10 sec 0 usec
Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=32
l2_packet_receive: src=22:5b:ad:66:dc:f3 len=99
wlp61s0: RX EAPOL from 22:5b:ad:66:dc:f3
wlp61s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c07 len=116
AssocReq IE wireless event - hexdump(len=100): 00 10 56 6f 64 61 66 6f 6e 65 20 48 6f 74 73 70 6f 74 01 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 2d 1a e7 11 17 ff ff 00 00 00 00 00 00 00 00 2c 01 01 00 00 00 00 00 00 00 00 00 00 7f 0b 00 00 0a 02 00 40 40 00 00 01 20 dd 07 00 50 f2 02 00 01 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=130
AssocResp IE wireless event - hexdump(len=114): 01 08 0c 12 18 24 30 48 60 6c 2d 1a 6f 09 1b ff 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 00 3d 16 24 0d 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 0e 14 00 0a 00 c8 00 c8 00 14 00 05 00 19 00 7f 08 05 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 22:5b:ad:66:dc:f3
wlp61s0: Event ASSOCINFO (4) received
wlp61s0: Association info event
req_ies - hexdump(len=100): 00 10 56 6f 64 61 66 6f 6e 65 20 48 6f 74 73 70 6f 74 01 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 2d 1a e7 11 17 ff ff 00 00 00 00 00 00 00 00 2c 01 01 00 00 00 00 00 00 00 00 00 00 7f 0b 00 00 0a 02 00 40 40 00 00 01 20 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=114): 01 08 0c 12 18 24 30 48 60 6c 2d 1a 6f 09 1b ff 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 00 3d 16 24 0d 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 0e 14 00 0a 00 c8 00 c8 00 14 00 05 00 19 00 7f 08 05 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlp61s0: RSN: clearing own RSNXE
wlp61s0: Event ASSOC (0) received
wlp61s0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp61s0: Associated to a new BSS: BSSID=22:5b:ad:66:dc:f3
wlp61s0: Associated with 22:5b:ad:66:dc:f3
wlp61s0: WPA: Association event - clear replay counter
wlp61s0: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlp61s0: Setting authentication timeout: 10 sec 0 usec
wlp61s0: Cancelling scan request
wlp61s0: Process pending EAPOL frame that was received just before association notification
wlp61s0: RX EAPOL from 22:5b:ad:66:dc:f3
wlp61s0: Setting authentication timeout: 10 sec 0 usec
wlp61s0: IEEE 802.1X RX: version=1 type=3 length=95
wlp61s0:   EAPOL-Key type=2
wlp61s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp61s0:   key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 81 c5 af a6 3b 1c cf 04 ae 47 65 5e 25 d9 62 d4 4f 0e da 92 56 bd b3 ed b2 4d 3f 7f a6 6d e9 f3
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp61s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp61s0: WPA: RX message 1 of 4-Way Handshake from 22:5b:ad:66:dc:f3 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): bf 32 dc 38 de 9b 57 92 73 e1 b8 28 92 cc e8 fd cb 06 3b db 05 a9 a4 4d 96 d7 96 e8 98 51 da 9c
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=48:f1:7f:c9:ff:18 A2=22:5b:ad:66:dc:f3
WPA: Nonce1 - hexdump(len=32): bf 32 dc 38 de 9b 57 92 73 e1 b8 28 92 cc e8 fd cb 06 3b db 05 a9 a4 4d 96 d7 96 e8 98 51 da 9c
WPA: Nonce2 - hexdump(len=32): 81 c5 af a6 3b 1c cf 04 ae 47 65 5e 25 d9 62 d4 4f 0e da 92 56 bd b3 ed b2 4d 3f 7f a6 6d e9 f3
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
wlp61s0: WPA: Sending EAPOL-Key 2/4
WPA: Send EAPOL-Key frame to 22:5b:ad:66:dc:f3 ver=2 mic_len=16 key_mgmt=0x2
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 4c 3a 8e b9 d8 ec 7b df f4 7f da 28 08 d0 c8 ce
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
l2_packet_receive: src=22:5b:ad:66:dc:f3 len=155
wlp61s0: RX EAPOL from 22:5b:ad:66:dc:f3
wlp61s0: IEEE 802.1X RX: version=1 type=3 length=151
wlp61s0:   EAPOL-Key type=2
wlp61s0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp61s0:   key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 81 c5 af a6 3b 1c cf 04 ae 47 65 5e 25 d9 62 d4 4f 0e da 92 56 bd b3 ed b2 4d 3f 7f a6 6d e9 f3
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 9d 1d cf 40 b6 7b 08 5a 71 53 af 95 58 b9 c4 97
WPA: EAPOL-Key MIC using HMAC-SHA1
RSN: encrypted key data - hexdump(len=56): 92 d3 a1 3e dd ae 8f 9a fb 7a 28 b7 04 db 37 82 06 e3 3b 0b 01 4c 62 f0 3e ca 8c b7 ec 56 c7 4e 86 f5 f9 f1 e7 80 9b 33 c9 ae 05 ce cd 38 27 21 27 b3 d3 bb 71 01 9a d6
WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
wlp61s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp61s0: WPA: RX message 3 of 4-Way Handshake from 22:5b:ad:66:dc:f3 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 e4 95 a5 63 83 77 63 c6 86 a4 af 20 ec a8 09 12 dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
wlp61s0: WPA: Sending EAPOL-Key 4/4
WPA: Send EAPOL-Key frame to 22:5b:ad:66:dc:f3 ver=2 mic_len=16 key_mgmt=0x2
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): d4 b3 e4 e5 a1 ec 2f fd 45 2e 25 db 88 ab 94 ef
wlp61s0: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
wlp61s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
wlp61s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16
wlp61s0: WPA: Key negotiation completed with 22:5b:ad:66:dc:f3 [PTK=CCMP GTK=CCMP]
wlp61s0: Cancelling authentication timeout
wlp61s0: State: GROUP_HANDSHAKE -> COMPLETED
wlp61s0: Radio work 'connect'@0xca3682ccf0 done in 0.044594 seconds
wlp61s0: radio_work_free('connect'@0xca3682ccf0): num_active_works --> 0
wlp61s0: CTRL-EVENT-CONNECTED - Connection to 22:5b:ad:66:dc:f3 completed [id=1 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=SUCCESS
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp61s0' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick

With an established connection dhcpd -dB outputs

dhcpcd -dB

sandbox: seccomp
sending commands to dhcpcd process
send OK

after milliseconds. Getting a coffee was impossible ;>

Something is missing here, I guess? There is not even a dhcpcd service!?

find /etc/systemd -type l -exec test -f {} \; -print | awk -F'/' '{ printf ("%-40s | %s\n", $(NF-0), $(NF-1)) }' | sort -f

avahi-daemon.service                     | multi-user.target.wants
avahi-daemon.socket                      | sockets.target.wants
bluetooth.service                        | bluetooth.target.wants
dbus-org.bluez.service                   | system
dbus-org.freedesktop.Avahi.service       | system
dbus-org.freedesktop.timesync1.service   | system
getty@tty1.service                       | getty.target.wants
p11-kit-server.socket                    | sockets.target.wants
pipewire-session-manager.service         | user
pipewire.socket                          | sockets.target.wants
pulseaudio.socket                        | sockets.target.wants
remote-fs.target                         | multi-user.target.wants
systemd-timesyncd.service                | sysinit.target.wants
wireplumber.service                      | pipewire.service.wants
xdg-user-dirs-update.service             | default.target.wants

Last edited by TinkerToadie (2023-07-30 11:00:27)

Offline

#6 2023-07-30 13:51:05

seth
Member
Registered: 2012-09-03
Posts: 52,274

Re: Can't ping IPv6 address [IPv6 module not loaded? Routing table issue?]

dhcpcd -dB

sandbox: seccomp
sending commands to dhcpcd process
send OK

There's already a running dhcpcd process, you need to kill that first.

Offline

Board footer

Powered by FluxBB